Archive for October, 2005

Some more Halloween photos

Monday, October 31st, 2005

Here are a few more [tag]Halloween[/tag] photos, or to be more precise, [tag]pumpkin[/tag] photos!

Hallow8 Hallow9

Hallow10 Hallow11

In honor of the Savage Chickens!

Monday, October 31st, 2005

I love the [tag]Savage Chickens[/tag] [tag]cartoons[/tag] by Doug Savage ... so here's a Savage Chicken [tag]Jack O'Lantern[/tag] I carved using the template he kindly provided.

Savage chicken halloween

Thanks Doug!

Guess what I’ve been doing …

Monday, October 31st, 2005

Getting ready for [tag]Halloween[/tag]!  

[tag]Pumpkin[/tag] [tag]carving[/tag] ... I like carving! This year the Leatherman Ti Charge gets another workout!

More carving ...

This one's feeling a little sick ...

The results ...




Overwrite deleted data in Windows XP/2003

Monday, October 31st, 2005

There's a tool installed on [tag]Windows XP[/tag] and [tag]Windows Server 2003[/tag] systems that you can use to [tag]encrypt[/tag], [tag]decrypt[/tag] and [tag]wipe[/tag] the [tag]free space[/tag] on drives. 

By wiping the free space on a drive you are improving [tag]security[/tag] because a standard delete doesn't actually delete the file, it's just that the space it occupies is deallocated and available for overwriting by other files.  Until this happens the file is easily retrievable.

This is a command line utility called [tag]cipher[/tag].exe.  It's quite easy to use.

  • Click Start > Run, type cmd, then press ENTER.
  • Type cipher /w:folder, and then press ENTER.  Here folder is any folder in the volume that you want to securely wipe.
    For example, if you type cipher /w:c:\secure, all the deallocated space on c drive will be overwritten. If c:\delete is a mount point to a folder on another volume, all the deallocated space on that volume will be wiped.

For more information on using cipher.exe, click Start > Run, type cmd, then press ENTER and type cipher /? at the command prompt.

Go phish!

Monday, October 31st, 2005

The latest post by Brian Krebs is one that I recommend everyone read - it's an interesting look at the various scammy tactics used by shady characters on the web to make you poorer and them richer.

There's another side to the article that I like too - it shows you the kind of sites that current anti-phishing technology is designed to protect you from.

The same rules apply:

  • If in doubt, don't!
  • If something seems too good to be true, then it probably is!

Stay safe!